Related-Key Boomerang and Rectangle Attacks⋆,⋆⋆

Total Page:16

File Type:pdf, Size:1020Kb

Related-Key Boomerang and Rectangle Attacks⋆,⋆⋆ Related-Key Boomerang and Rectangle Attacks⋆,⋆⋆ Jongsung Kim1, Seokhie Hong2, Bart Preneel3, Eli Biham4, Orr Dunkelman3,5,7,⋆⋆⋆, and Nathan Keller6,7,† 1 Division of e-Business, Kyungnam University, 449, Wolyeong-dong, Masan, Kyungnam, 631-701, Korea, [email protected] 2 Center for Information Security Technologies (CIST), Korea University, Anam Dong, Sungbuk Gu, Seoul, Korea, [email protected] 3 Katholieke Universiteit Leuven, Department of Electrical Engineering ESAT/SCD-COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium, [email protected] 4 Computer Science Department, Technion, Haifa 32000, Israel, [email protected] 5 Ecole´ Normale Sup´erieure D´epartement d’Informatique, 45 rue d’Ulm, 75230 Paris, France. 6 Einstein Institute of Mathematics, Hebrew University. Jerusalem 91904, Israel 7 Faculty of Mathematics and Computer Science Weizmann Institute of Science P.O. Box 26, Rehovot 76100, Israel {orr.dunkelman,nathan.keller}@weizmann.ac.il Abstract. This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the crypt- analytic toolbox, and can be applied to many block ciphers. The main advantage of these new attacks, is the ability to exploit the related-key model twice. Hence, even ciphers which were considered resistant to ei- ther boomerang or related-key differential attacks may be broken using the new techniques. ⋆ This paper is partially based on the papers [9, 10, 27] which appeared at EURO- CRYPT 2005, ASIACRYPT 2005 and FSE 2007, respectively. ⋆⋆ This paper was submitted to a Journal on October 2009. ⋆⋆⋆ The fifth author was partially supported by the Clore scholarship programme and in part by the Concerted Research Action (GOA) Ambiorics 2005/11 of the Flem- ish Government and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy). † The sixth author was partially supported by the Adams Fellowship Program of the Israel Academy of Sciences and Humanities. In this paper we present a rigorous treatment of the related-key boomerang and the related-key rectangle distinguishers. Following this treatment, we devise optimal distinguishing algorithms using the LLR (Logarithmic Likelihood Ratio) statistics. We then analyze the success probability un- der reasonable independence assumptions, and verify the computation experimentally by implementing an actual attack on a 6-round variant of KASUMI. The paper ends with a demonstration of the strength of our new proposed techniques with attacks on 10-round AES-192 and the full KASUMI. Keywords: Related-key Boomerang Attack, Related-Key Rectangle At- tack, AES, KASUMI. 1 Introduction Related-key differentials are an extension of differentials, where the adversary is allowed a control over the key difference along with control over the plain- text/ciphertext differences [23]. The additional control gives the adversary the possibility to cancel differences that enter the nonlinear parts of the cipher, and as a result, the probability of the differential is increased. While the use of related-key differentials in differential attacks has been stud- ied for more than a decade, the idea of using the related-key differentials in more complex attacks has not been as extensively studied. Although techniques like related-key impossible differential [22] and related-key differential-linear crypt- analysis [11] were used to attack specific ciphers, no systematic analysis was suggested. In this paper we examine the applicability of related-key differentials in the boomerang and the rectangle attacks. We show that it is possible to change the differentials into related-key differentials, and allow the adversary to enjoy the related-key advantage twice, using two related-key differentials at the expense of using four keys for the attack.8 1.1 The Related-Key Model The related-key model was introduced in [4, 28] and deals with attack scenarios where the adversary is given access to encryption under multiple unknown keys, such that the relation between them is known to (or even chosen by) the ad- versary. While this model might seem too strong, it has practical implications. Amongst the many issues, a block cipher which is not secure against related-key attacks might fail as a hash function (for example, a related-key attack on the block cipher TEA [40] used in Microsoft’s Xbox architecture as a hash function, was used to hack the system). Related-key attacks were intensively studied in the last decade, both from the theoretical [2] and the practical [11,12,19,22,43] points of view. Immunity to related-key attacks is considered one of the security goals in the design of modern block ciphers [16]. 8 We note that in some cases the number of keys remains two. 1.2 The Boomerang and the Rectangle Attacks The boomerang attack [38] is a differential-based attack that uses two short differentials (of few rounds each) rather than one long differential (of many rounds). In an adaptive chosen plaintext and ciphertext process, the adversary constructs boomerang quartets by exploiting the short differentials. The attack was later transformed into a chosen plaintext variant named the amplified boomerang attack [25] (and then renamed as the rectangle attack [7]). The transformation is done by a birthday-paradox argument, which leads to a higher data complexity, but still allows the use of two short differentials. All of these attacks treat the distinguished part of the cipher E as a decompo- sition into two sub-ciphers, E = E1 E0, where in each of these two sub-ciphers some (relatively) high probability differential◦ exists. If the probability of the differential of E0 is p and the probability of the differential of E1 is q, then the data complexity of the corresponding boomerang distinguisher is O((pq)−2) adaptively chosen plaintexts and ciphertexts and of the rectangle distinguisher is O(2n/2 (pq)−1) chosen plaintexts, where n is the block size. · In the more complex variants of these attacks the use of multiple differentials is supported as long as they share the input difference in the differentials for E0 (the first rounds) and share the output difference in the differentials for E1 (the last rounds). This improvement reduces the data complexity of both attacks significantly. 1.3 Our Contributions We consider the same conceptual division. Let the cipher E be a concatena- tion of two sub-ciphers, i.e., E = E E . Furthermore, assume that there exist 1 ◦ 0 high-probability related-key differentials in E0 and in E1 (not necessarily with the same key difference). We show that in this scenario it is possible to apply related-key boomerang and rectangle attacks. The basic related-key boomerang and rectangle distinguishers are summarized in the following theorem: n n Theorem 1. Let E = E1 E0 : 0, 1 0, 1 be a block cipher. Consider encryptions with E under a◦ secret{ key }K and→ { related-keys} whose differences with K are chosen by the adversary. Let 2 pˆ = max Pr [E0,K (P ) E0,K⊕∆K0 (P α)= β] , α6=0,∆K0 P ⊕ ⊕ s β X 2 −1 −1 qˆ = max Pr E1,K (C) E1,K⊕∆K1 (C δ)= γ δ6=0,∆K1 C ⊕ ⊕ s γ X h i 2 = max Pr [E1,K (X) E1,K⊕∆K1 (X γ)= δ] δ6=0,∆K1 X ⊕ ⊕ s γ X where E0,K (P ) denotes the partial encryption of P through E0 under the key −1 K and E1,K (C) denotes the partial decryption of C through E1 under the key K. Under independence assumptions between the differentials, for c > 0, given either – 4c/(ˆpqˆ)2 unique adaptively chosen plaintexts and ciphertexts, or – √c 2n/2+2/pˆqˆ unique chosen plaintexts, · encrypted under four related-keys of the form K,K ∆K0,K ∆K1,K ∆K0 9 ⊕ ⊕ ⊕ ⊕ ∆K1, it is possible to distinguish E from a random permutation. The probability of success of the distinguisher is approximately 1 e−c/2 (when pˆqˆ is sufficiently high). − We present a rigorous treatment of the related-key boomerang and rectangle distinguishers. We devise the optimal distinguishing algorithms using the LLR metric, and compute their success rate. Using this analysis, we prove Theorem 1, along with an easy lemma allowing to calculate lower bounds forp ˆ andq ˆ in practical ciphers. As in other statistical attacks on block ciphers, the calculation of the success probability of our attack is based on some randomness assumptions. We state explicitly the assumptions we use and discuss their validity in various cases. To verify the validity of these assumptions we carried out computer experiments for the related-key boomerang attack on 6-round KASUMI [36]. We note that the analysis presented in our paper is also the first rigorous analysis of the boomerang/rectangle techniques themselves. Although these tech- niques were used many times in attacks, a rigorous analysis of them was not performed before. After the theoretical treatment, we consider several improvements of the related-key boomerang and rectangle attacks: 1. The Use of Structures of Keys: We use structures of keys to overcome a wider range of key schedule algorithms. In ciphers with a nonlinear key schedule, a given key difference may cause many subkey differences, thus interfering with the construction of related-key differentials. Structures of keys can be used to reduce the effect of this event on the differentials. 2. The Use of Other Relations between the Keys: While XOR relations are common and inherent to the majority of differential-based related-key attacks, in some cases there are more suitable key relations (either due to the environment of the attack or in order to get higher probabilities of the differentials). We show that the proposed attacks are applicable when the XOR relations between the keys are replaced with different kinds of relations and discuss which relations induce feasible attacks.
Recommended publications
  • Cs 255 (Introduction to Cryptography)
    CS 255 (INTRODUCTION TO CRYPTOGRAPHY) DAVID WU Abstract. Notes taken in Professor Boneh’s Introduction to Cryptography course (CS 255) in Winter, 2012. There may be errors! Be warned! Contents 1. 1/11: Introduction and Stream Ciphers 2 1.1. Introduction 2 1.2. History of Cryptography 3 1.3. Stream Ciphers 4 1.4. Pseudorandom Generators (PRGs) 5 1.5. Attacks on Stream Ciphers and OTP 6 1.6. Stream Ciphers in Practice 6 2. 1/18: PRGs and Semantic Security 7 2.1. Secure PRGs 7 2.2. Semantic Security 8 2.3. Generating Random Bits in Practice 9 2.4. Block Ciphers 9 3. 1/23: Block Ciphers 9 3.1. Pseudorandom Functions (PRF) 9 3.2. Data Encryption Standard (DES) 10 3.3. Advanced Encryption Standard (AES) 12 3.4. Exhaustive Search Attacks 12 3.5. More Attacks on Block Ciphers 13 3.6. Block Cipher Modes of Operation 13 4. 1/25: Message Integrity 15 4.1. Message Integrity 15 5. 1/27: Proofs in Cryptography 17 5.1. Time/Space Tradeoff 17 5.2. Proofs in Cryptography 17 6. 1/30: MAC Functions 18 6.1. Message Integrity 18 6.2. MAC Padding 18 6.3. Parallel MAC (PMAC) 19 6.4. One-time MAC 20 6.5. Collision Resistance 21 7. 2/1: Collision Resistance 21 7.1. Collision Resistant Hash Functions 21 7.2. Construction of Collision Resistant Hash Functions 22 7.3. Provably Secure Compression Functions 23 8. 2/6: HMAC And Timing Attacks 23 8.1. HMAC 23 8.2.
    [Show full text]
  • Vmware Java JCE (Java Cryptographic Extension) Module Software Version: 2.0
    VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304, USA Tel: 877-486-9273 Email: [email protected] http://www. vmware.com VMware Java JCE (Java Cryptographic Extension) Module Software Version: 2.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Security Policy, Version 0.5 VMware Java JCE (Java Cryptographic Extension) Module TABLE OF CONTENTS 1 Introduction .................................................................................................................................................. 4 1.1 Purpose......................................................................................................................................................... 4 1.2 Reference ..................................................................................................................................................... 4 2 VMware Java JCE (Java Cryptographic Extension) Module ............................................................................ 5 2.1 Introduction .................................................................................................................................................. 5 2.1.1 VMware Java JCE (Java Cryptographic Extension) Module ...................................................................... 5 2.2 Module Specification .................................................................................................................................... 5 2.2.1 Physical Cryptographic Boundary ...........................................................................................................
    [Show full text]
  • Cryptanalysis of Selected Block Ciphers
    Downloaded from orbit.dtu.dk on: Sep 24, 2021 Cryptanalysis of Selected Block Ciphers Alkhzaimi, Hoda A. Publication date: 2016 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Alkhzaimi, H. A. (2016). Cryptanalysis of Selected Block Ciphers. Technical University of Denmark. DTU Compute PHD-2015 No. 360 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Cryptanalysis of Selected Block Ciphers Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy at the Department of Mathematics and Computer Science-COMPUTE in The Technical University of Denmark by Hoda A.Alkhzaimi December 2014 To my Sanctuary in life Bladi, Baba Zayed and My family with love Title of Thesis Cryptanalysis of Selected Block Ciphers PhD Project Supervisor Professor Lars R. Knudsen(DTU Compute, Denmark) PhD Student Hoda A.Alkhzaimi Assessment Committee Associate Professor Christian Rechberger (DTU Compute, Denmark) Professor Thomas Johansson (Lund University, Sweden) Professor Bart Preneel (Katholieke Universiteit Leuven, Belgium) Abstract The focus of this dissertation is to present cryptanalytic results on selected block ci- phers.
    [Show full text]
  • Cryptanalysis of Block Ciphers
    Cryptanalysis of Block Ciphers Jiqiang Lu Technical Report RHUL–MA–2008–19 30 July 2008 Royal Holloway University of London Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports CRYPTANALYSIS OF BLOCK CIPHERS JIQIANG LU Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Mathematics Royal Holloway, University of London 2008 Declaration These doctoral studies were conducted under the supervision of Prof. Chris Mitchell. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Information Security Group of Royal Holloway, University of London as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jiqiang Lu July 2008 2 Acknowledgements First of all, I thank my supervisor Prof. Chris Mitchell for suggesting block cipher cryptanalysis as my research topic when I began my Ph.D. studies in September 2005. I had never done research in this challenging ¯eld before, but I soon found it to be really interesting. Every time I ¯nished a manuscript, Chris would give me detailed comments on it, both editorial and technical, which not only bene¯tted my research, but also improved my written English. Chris' comments are fantastic, and it is straightforward to follow them to make revisions. I thank my advisor Dr. Alex Dent for his constructive suggestions, although we work in very di®erent ¯elds.
    [Show full text]
  • The Retracing Boomerang Attack
    The Retracing Boomerang Attack Orr Dunkelman1, Nathan Keller2, Eyal Ronen3;4, and Adi Shamir5 1 Computer Science Department, University of Haifa, Israel [email protected] 2 Department of Mathematics, Bar-Ilan University, Israel [email protected] 3 School of Computer Science, Tel Aviv University, Tel Aviv, Israel [email protected] 4 COSIC, KU Leuven, Heverlee, Belgium 5 Faculty of Mathematics and Computer Science, Weizmann Institute of Science, Israel [email protected] Abstract. Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability p2q2 (since each one of the properties has to be satisfied twice). In this paper we describe a new version of boomerang attacks which uses the counterintuitive idea of throwing out most of the data (including poten- tially good cases) in order to force equalities between certain values on the ciphertext side. This creates a correlation between the four proba- bilistic events, which increases the probability of the combined property to p2q and increases the signal to noise ratio of the resultant distin- guisher. We call this variant a retracing boomerang attack since we make sure that the boomerang we throw follows the same path on its forward and backward directions. To demonstrate the power of the new technique, we apply it to the case of 5-round AES. This version of AES was repeatedly attacked by a large variety of techniques, but for twenty years its complexity had remained stuck at 232.
    [Show full text]
  • Statistical Cryptanalysis of Block Ciphers
    STATISTICAL CRYPTANALYSIS OF BLOCK CIPHERS THÈSE NO 3179 (2005) PRÉSENTÉE À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS Institut de systèmes de communication SECTION DES SYSTÈMES DE COMMUNICATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pascal JUNOD ingénieur informaticien dilpômé EPF de nationalité suisse et originaire de Sainte-Croix (VD) acceptée sur proposition du jury: Prof. S. Vaudenay, directeur de thèse Prof. J. Massey, rapporteur Prof. W. Meier, rapporteur Prof. S. Morgenthaler, rapporteur Prof. J. Stern, rapporteur Lausanne, EPFL 2005 to Mimi and Chlo´e Acknowledgments First of all, I would like to warmly thank my supervisor, Prof. Serge Vaude- nay, for having given to me such a wonderful opportunity to perform research in a friendly environment, and for having been the perfect supervisor that every PhD would dream of. I am also very grateful to the president of the jury, Prof. Emre Telatar, and to the reviewers Prof. em. James L. Massey, Prof. Jacques Stern, Prof. Willi Meier, and Prof. Stephan Morgenthaler for having accepted to be part of the jury and for having invested such a lot of time for reviewing this thesis. I would like to express my gratitude to all my (former and current) col- leagues at LASEC for their support and for their friendship: Gildas Avoine, Thomas Baign`eres, Nenad Buncic, Brice Canvel, Martine Corval, Matthieu Finiasz, Yi Lu, Jean Monnerat, Philippe Oechslin, and John Pliam. With- out them, the EPFL (and the crypto) would not be so fun! Without their support, trust and encouragement, the last part of this thesis, FOX, would certainly not be born: I owe to MediaCrypt AG, espe- cially to Ralf Kastmann and Richard Straub many, many, many hours of interesting work.
    [Show full text]
  • Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8S3, June 2019 Research Problems in Block Cipher Cryptanalysis: An Experimental Analysis Amandeep, G. Geetha Abstract: Cryptography has always been a very concerning Organization of this paper is as follows. Section 2 lists the issue in research related to digital security. The dynamic need of Block ciphers in a chronological order in a table having six applications and keeping online transactions secure have been columns stating name of the algorithm, year of publication, giving pathways to the need of developing different its cryptographic strategies. Though a number of cryptographic structure, block size, key size, and the cryptanalysis done on algorithms have been introduced till now, but each of these algorithms has its own disadvantages or weaknesses which are that particular cipher. This table becomes the basis of the identified by the process of cryptanalysis. This paper presents a analysis done in Section 3 and tabulates the information as to survey of different block ciphers and the results of attempts to which structure has been cryptanalyzed more, thereby identify their weakness. Depending upon the literature review, establishing a trend of structures analyzed Section 4 some open research problems are being presented which the identifies the open research problems based on the analysis cryptologists can depend on to work for bettering cyber security. done in Section 3. Section 5 of the paper, presents the conclusion of this study. Index Terms: block ciphers, cryptanalysis, attacks, SPN, Feistel. II. RELATED WORK I. INTRODUCTION This paper surveys 69 block ciphers and presents, in Cryptography is the science which deals with Table I, a summarized report as per the attacks concerned.
    [Show full text]
  • Amplified Boomerang Attack Against Reduced-Round SHACAL
    Amplified Boomerang Attack against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies (CIST), Korea University, Anam Dong, Sungbuk Gu, Seoul, Korea, {joshep,djmoon,nice,hsh,sangjin,jsw}@cist.korea.ac.kr Abstract. SHACAL is a 160-bit block cipher based on the hash stan- dard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, mod- ular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability. But, we can find short differential characteristics with high probabilities. Using this fact, we discuss the security of SHACAL against an ampli- fied boomerang attack. We find a 36-step boomerang-distinguisher and present attacks on reduced-round SHACAL with various key sizes. We can attack 39-step SHACAL with 256-bit key, and 47-step SHACAL with 512-bit key. In addition, we present differential attacks of reduced-round SHACAL with various key sizes. Keyword: SHACAL, Amplified boomerang attack, Boomerang-distin- guisher 1 Introduction SHACAL[3] is a 4-round block cipher (each line consists of 20 steps.) designed by H. Handschuh and D. Naccache and is one of the accepted NESSIE submissions. SHACAL was designed by using the hash standard SHA-1 in encryption mode for the first time in 2000. Also, H. Handschuh and D. Naccache introduced a modification[4] of SHACAL in its two versions SHACAL-1 and SHACAL-2 in 2001.
    [Show full text]
  • On the Feistel Counterpart of the Boomerang Connectivity Table Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier
    On the Feistel Counterpart of the Boomerang Connectivity Table Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier To cite this version: Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier. On the Feis- tel Counterpart of the Boomerang Connectivity Table: Introduction and Analysis of the FBCT. IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.331-362. 10.13154/tosc.v2020.i1.331-362. hal-02945065 HAL Id: hal-02945065 https://hal.inria.fr/hal-02945065 Submitted on 26 Oct 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2020, No. 1, pp. 331–362. DOI:10.13154/tosc.v2020.i1.331-362 On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the FBCT Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal and Marine Minier Université de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France [email protected] Abstract. At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es).
    [Show full text]
  • Statistical Cryptanalysis of Block Ciphers
    Statistical Cryptanalysis of Block Ciphers THESE` N◦ 3179 (2004) PRESENT´ EE´ A` LA FACULTE´ INFORMATIQUE & COMMUNICATIONS Institut de syst`emes de communication SECTION DES SYSTEMES` DE COMMUNICATION ECOLE´ POLYTECHNIQUE FED´ ERALE´ DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ES` SCIENCES PAR Pascal JUNOD ing´enieur informaticien diplom´e EPF de nationalit´e suisse et originaire de Sainte-Croix (VD) accept´ee sur proposition du jury: Prof. Emre Telatar (EPFL), pr´esident du jury Prof. Serge Vaudenay (EPFL), directeur de th`ese Prof. Jacques Stern (ENS Paris, France), rapporteur Prof. em. James L. Massey (ETHZ & Lund University, Su`ede), rapporteur Prof. Willi Meier (FH Aargau), rapporteur Prof. Stephan Morgenthaler (EPFL), rapporteur Lausanne, EPFL 2005 to Mimi and Chlo´e Acknowledgments First of all, I would like to warmly thank my supervisor, Prof. Serge Vaude- nay, for having given to me such a wonderful opportunity to perform research in a friendly environment, and for having been the perfect supervisor that every PhD would dream of. I am also very grateful to the president of the jury, Prof. Emre Telatar, and to the reviewers Prof. em. James L. Massey, Prof. Jacques Stern, Prof. Willi Meier, and Prof. Stephan Morgenthaler for having accepted to be part of the jury and for having invested such a lot of time for reviewing this thesis. I would like to express my gratitude to all my (former and current) col- leagues at LASEC for their support and for their friendship: Gildas Avoine, Thomas Baign`eres, Nenad Buncic, Brice Canvel, Martine Corval, Matthieu Finiasz, Yi Lu, Jean Monnerat, Philippe Oechslin, and John Pliam.
    [Show full text]
  • A Methodology for Differential-Linear Cryptanalysis and Its Applications⋆
    A Methodology for Differential-Linear Cryptanalysis and Its Applications? (Extended Abstract) Jiqiang Lu Institute for Infocomm Research, Agency for Science, Technology and Research 1 Fusionopolis Way, #19-01 Connexis, Singapore 138632 [email protected],[email protected] Abstract. In 1994 Langford and Hellman introduced a combination of differential and linear cryptanalysis under two default independence as- sumptions, known as differential-linear cryptanalysis, which is based on the use of a differential-linear distinguisher constructed by concatenating a linear approximation with a (truncated) differential with probability 1. In 2002, by using an additional assumption, Biham, Dunkelman and Keller gave an enhanced version that can be applicable to the case when a differential with a probability of smaller than 1 is used to construct a differential-linear distinguisher. In this paper, we present a new method- ology for differential-linear cryptanalysis under the original two assump- tions implicitly used by Langford and Hellman, without using the addi- tional assumption of Biham et al. The new methodology is more reason- able and more general than Biham et al.'s methodology, and apart from this advantage it can lead to some better differential-linear cryptanalytic results than Biham et al.'s and Langford and Hellman's methodologies. As examples, we apply it to attack 10 rounds of the CTC2 block cipher with a 255-bit block size and key, 13 rounds of the DES block cipher, and 12 rounds of the Serpent block cipher. The new methodology can be used to cryptanalyse other block ciphers, and block cipher designers should pay attention to this new methodology when designing a block cipher.
    [Show full text]
  • Linear Cryptanalysis Combined Attack on Cryptographic Security System
    International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 23 (2018) pp. 16552-16563 © Research India Publications. http://www.ripublication.com Evaluation of Differential – Linear Cryptanalysis Combined Attack on Cryptographic Security System B. Srinivasa Rao1 and P. Premchand2 1 Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad-500090 Jawaharlal Nehru Technological University Hyderabad, Hyderabad 500038 Telangana, India. 2 Department of Computer Science Engineering, University College of Engineering, Osmania University, Hyderabad-500007 India. Abstract quite natural that when new attacks are being designed to counter them strong security measures are devised for In the present research work a novel model has been proposed cryptographic systems. Hence it is obvious that new attacks for evaluation of Differential-Linear cryptanalysis on complex are to be designed for enhanced security systems. However, it cryptographic security system. The differential and linear is a continuous and endless process for designing new attacks methods of whale optimization algorithm have been used as and new counter measures. But in each aspect new and combined attack. A combination of Blowfish and DES creative ideas may improve or provide better and efficient algorithm has been used for design of complex cryptographic techniques. The present research work is the motivation from security system. This proposed work has been implemented in the above discussion. In the present research work a novel Java programming language with JDK 1.7.0. The comparison model has been proposed for evaluation of Differential-Linear of computed key optimization time for several data sets of cryptanalysis on complex cryptographic security system.
    [Show full text]